MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

Hack In The Box

磁力链接/BT种子名称

Hack In The Box

磁力链接/BT种子简介

种子哈希:cb36d9a39948efa8d8311bf21e2a1e2eea9468d3
文件大小: 42.89G
已经下载:410次
下载速度:极快
收录时间:2017-02-11
最近下载:2018-11-22

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:CB36D9A39948EFA8D8311BF21E2A1E2EEA9468D3
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 91视频 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 抖阴破解版 极乐禁地 91短视频 抖音Max TikTok成人版 PornHub 听泉鉴鲍 少女日记 草榴社区 哆哔涩漫 呦乐园 萝莉岛 悠悠禁区 悠悠禁区 拔萝卜 疯马秀

最近搜索

bj女团 御姐母狗 mandala 认真 插着 filecr 浪叫不止, 麻生 洗澡 极品 反差 3p 之星 小姨子的 老板娘 钻石海 侵 校花的 酒店偷拍流出 ipzz-407 娜娜3p内射 【夫妻交换】从业史上最精彩的一集,护士良家惨遭暴力抽插 反差婊流出 独家 拍丝袜 街拍大 最终章 极品巨 不记得 模特 拍 撮影 blk 661

文件列表

  • HITB 2007 - Malaysia/CTF Prize Giving and Charity Auction.mov 484.6 MB
  • HITB 2003 - Malyasia/bt1.mp4 143.2 MB
  • HITB 2003 - Malyasia/bt2.mp4 91.4 MB
  • HITB 2003 - Malyasia/bt3.mp4 73.3 MB
  • HITB 2003 - Malyasia/bt4.mp4 85.4 MB
  • HITB 2003 - Malyasia/bt5.mp4 84.5 MB
  • HITB 2003 - Malyasia/bt6.mp4 40.3 MB
  • HITB 2003 - Malyasia/panel.mp4 166.3 MB
  • HITB 2003 - Malyasia/tt1.mp4 144.5 MB
  • HITB 2003 - Malyasia/tt2.mp4 115.6 MB
  • HITB 2003 - Malyasia/tt3.mp4 96.2 MB
  • HITB 2003 - Malyasia/tt4.mp4 119.1 MB
  • HITB 2003 - Malyasia/tt5.mp4 128.3 MB
  • HITB 2003 - Malyasia/tt6.mp4 157.1 MB
  • HITB 2003 - Malyasia/tt7.mp4 185.6 MB
  • HITB 2003 - Malyasia/tt8.mp4 100.9 MB
  • HITB 2003 - Malyasia/tt9.mp4 164.8 MB
  • HITB 2004 - Malyasia/proceedings/hitb04-adam-gowdiak.pdf 56.4 MB
  • HITB 2004 - Malyasia/proceedings/hitb04-captain-crunch-01.pdf 41.7 kB
  • HITB 2004 - Malyasia/proceedings/hitb04-captain-crunch-02.pdf 38.6 kB
  • HITB 2004 - Malyasia/proceedings/hitb04-chew-keong-tan.pdf 9.0 MB
  • HITB 2004 - Malyasia/proceedings/hitb04-emmanuel-gadaix.pdf 43.8 MB
  • HITB 2004 - Malyasia/proceedings/hitb04-fyodor-meder.pdf 880.4 kB
  • HITB 2004 - Malyasia/proceedings/hitb04-gareth-davies.pdf 589.7 kB
  • HITB 2004 - Malyasia/proceedings/hitb04-grugq.pdf 1.1 MB
  • HITB 2004 - Malyasia/proceedings/hitb04-jose-nazario.pdf 458.4 kB
  • HITB 2004 - Malyasia/proceedings/hitb04-kamal-hilmi.tgz 657.1 kB
  • HITB 2004 - Malyasia/proceedings/hitb04-roberto-fabio.pdf 2.1 MB
  • HITB 2004 - Malyasia/proceedings/hitb04-shreeraj-shah.pdf 583.6 kB
  • HITB 2004 - Malyasia/proceedings/hitb04-sk-chong.pdf 988.5 kB
  • HITB 2004 - Malyasia/proceedings/hitb04-sukhdev-singh.pdf 13.8 MB
  • HITB 2004 - Malyasia/proceedings/hitb04-teo-sze-siong.zip 364.7 kB
  • HITB 2004 - Malyasia/proceedings/hitb04-theo-deraadt.zip 2.7 MB
  • HITB 2004 - Malyasia/proceedings/hitb04-toh-swee-hoe.pdf 6.7 MB
  • HITB 2004 - Malyasia/videos/hitb2004-adam-gowdiak.mp4 203.1 MB
  • HITB 2004 - Malyasia/videos/hitb2004-emmanuel-gadaix.mp4 197.0 MB
  • HITB 2004 - Malyasia/videos/hitb2004-fyodor-and-meder.mp4 95.4 MB
  • HITB 2004 - Malyasia/videos/hitb2004-gareth-davies.mp4 63.9 MB
  • HITB 2004 - Malyasia/videos/hitb2004-grugq.mp4 101.2 MB
  • HITB 2004 - Malyasia/videos/hitb2004-jorge-sebastiao.mp4 71.0 MB
  • HITB 2004 - Malyasia/videos/hitb2004-jose-nazario.mp4 120.3 MB
  • HITB 2004 - Malyasia/videos/hitb2004-keynote-1-theo-de-raadt.mp4 101.2 MB
  • HITB 2004 - Malyasia/videos/hitb2004-panel-discussion.mp4 111.3 MB
  • HITB 2004 - Malyasia/videos/hitb2004-roberto-and-fabio.mp4 145.2 MB
  • HITB 2004 - Malyasia/videos/hitb2004-shreeraj-shah.mp4 144.2 MB
  • HITB 2004 - Malyasia/videos/hitb2004-sk-chong.mp4 173.1 MB
  • HITB 2004 - Malyasia/videos/hitb2004-sukdev-singh.mp4 76.0 MB
  • HITB 2004 - Malyasia/videos/hitb2004-suresh-ramasamy.mp4 67.1 MB
  • HITB 2004 - Malyasia/videos/hitb2004-teo-sze-siong.mp4 74.3 MB
  • HITB 2004 - Malyasia/videos/hitb2004-toh-swee-hoe.mp4 127.7 MB
  • HITB 2005 - Malaysia/proceedings/BT-Anthony-Zboralski-Social-Engineering.pdf 1.1 MB
  • HITB 2005 - Malaysia/proceedings/BT-Fabrice-Marie-Hacking-Internet-Banking-Applications.pdf 1.2 MB
  • HITB 2005 - Malaysia/proceedings/BT-Raoul-Chiesa-X25-Security.pdf 1.1 MB
  • HITB 2005 - Malaysia/proceedings/BT-Roberto-Preatoni-Fabio-Ghioni-Corp-vs-Corp.ppt 7.5 MB
  • HITB 2005 - Malaysia/proceedings/BT-Tim-Pritlove-Blinkenlights-Arcade-Project.pdf 5.3 MB
  • HITB 2005 - Malaysia/proceedings/HITB.gif 14.4 kB
  • HITB 2005 - Malaysia/proceedings/Keynote-Mikko-Hypponen-Mobile-Malware.pdf 3.6 MB
  • HITB 2005 - Malaysia/proceedings/Keynote-Tony-Chor-IE-Security-Past-Present-and-Future.ppt 5.1 MB
  • HITB 2005 - Malaysia/proceedings/Mark Schoenefeld - Java and Secure Programming.pdf 3.7 MB
  • HITB 2005 - Malaysia/proceedings/TT-Dave-Aitel-Nematodes.zip 63.3 kB
  • HITB 2005 - Malaysia/proceedings/TT-Fyodor-Yarochkin-Meder-Kydyraliev-STIFware-Evolution.ppt 491.0 kB
  • HITB 2005 - Malaysia/proceedings/TT-Jim-Geovedi-Hotspot-Security.pdf 789.6 kB
  • HITB 2005 - Malaysia/proceedings/TT-Joanna-Rutkowska-HITB-Virginity-Verifier.ppt 540.7 kB
  • HITB 2005 - Malaysia/proceedings/TT-Jose-Nazario-Analyzing-all-that-data.pdf 806.3 kB
  • HITB 2005 - Malaysia/proceedings/TT-Nish-Bhalla-Defects-Overview.pdf 614.9 kB
  • HITB 2005 - Malaysia/proceedings/TT-Roelof-Temmingh-State-of-the-art.ppt 2.6 MB
  • HITB 2005 - Malaysia/proceedings/TT-San-Hacking-Windows-CE.ppt 900.1 kB
  • HITB 2005 - Malaysia/proceedings/TT-Shreeraj-Shah-Webhacking-Kungfu.pdf 294.0 kB
  • HITB 2005 - Malaysia/proceedings/TT-The-Grugq-VoIPPhreaking.ppt 137.2 kB
  • HITB 2005 - Malaysia/video/AnalyzingCode.mp4 116.7 MB
  • HITB 2005 - Malaysia/video/AssesingSrvSec.mp4 161.9 MB
  • HITB 2005 - Malaysia/video/BeneficialWorms.mp4 184.8 MB
  • HITB 2005 - Malaysia/video/BuildSecOperCenter.mp4 142.3 MB
  • HITB 2005 - Malaysia/video/CCC.mp4 156.4 MB
  • HITB 2005 - Malaysia/video/CyberSkirmishes.mp4 90.5 MB
  • HITB 2005 - Malaysia/video/HckingWinCE.mp4 137.8 MB
  • HITB 2005 - Malaysia/video/HckInternetBankingApp.mp4 160.7 MB
  • HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Fyodor Y.mp4 81.2 MB
  • HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Roelof T.mp4 87.3 MB
  • HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Fabrice M.mp4 87.1 MB
  • HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Jim Geove.mp4 50.7 MB
  • HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Joanna Ru.mp4 87.0 MB
  • HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Marc Scho.mp4 87.1 MB
  • HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Raoul Chi.mp4 98.0 MB
  • HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Roberto P.mp4 80.0 MB
  • HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Rohyt Bel.mp4 53.1 MB
  • HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ The Grugq.mp4 99.6 MB
  • HITB 2005 - Malaysia/video/IE-Security.mp4 256.9 MB
  • HITB 2005 - Malaysia/video/Java&SecProgramming.mp4 161.0 MB
  • HITB 2005 - Malaysia/video/MobileMalware.mp4 216.9 MB
  • HITB 2005 - Malaysia/video/ModernEspionage_all.mp4 222.8 MB
  • HITB 2005 - Malaysia/video/RealWorldAttacks.mp4 129.2 MB
  • HITB 2005 - Malaysia/video/SocialEngineeringFundam.mp4 148.4 MB
  • HITB 2005 - Malaysia/video/STIF-wareEvol.mp4 170.5 MB
  • HITB 2005 - Malaysia/video/StiftingHaystacks.mp4 140.5 MB
  • HITB 2005 - Malaysia/video/VoIPhreaking.mp4 176.0 MB
  • HITB 2005 - Malaysia/video/WHckingKungFU.mp4 144.8 MB
  • HITB 2005 - Malaysia/video/wifiHotspotSec.mp4 94.9 MB
  • HITB 2005 - Malaysia/video/windowsMalwareDetection.mp4 161.0 MB
  • HITB 2005 - Malaysia/video/x25SecurityWwwww.mp4 204.3 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia - Mark Curp.mp4 59.1 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia - Mark Curphey & John Viega - Keynote.mp4 59.1 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Ching Ti.mp4 73.2 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Ching Tim Meng - X.805 Standard.mp4 73.2 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Michael Davis - Client Honeypots - Its not only ...(2).mp4 45.6 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Michael Davis - Client Honeypots - Its not only ....mp4 45.6 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Michael.mp4 45.6 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Anthony Z.mp4 79.7 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Anthony Zboralski & Dave McKay - Hacking Trust.mp4 79.7 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Carlos Sarraute & Javier Burroni - Neural Networks.mp4 53.2 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ CTF Prize Giving & Charity Auction.mp4 75.2 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Douglas M.mp4 72.1 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Douglas MacIver - Pen Testing Windows Vista BitLocker.mp4 72.1 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Fabrice M.mp4 83.6 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Fabrice Marie - Application Intrusion Prevention....mp4 83.6 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Fyodor Yarochkin & Meder Kydyraliev - YAWATT.mp4 48.1 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Jim Geove.mp4 68.4 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Jim Geovedi & Raditya Iryandi - Hacking VSAT.mp4 68.4 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Joanna Rutkowska - Subverting Vista Kernel for Fun...mp4 87.8 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Jonathan Limbo - The world through the eyes of a .....mp4 36.8 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Lisa Thal.mp4 48.2 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Lisa Thalheim - Visualization of Source Code.mp4 48.2 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Marc Scho.mp4 88.8 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Marc Schonefeld - Pentesting Java_J2EE.mp4 88.8 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Nguyen An.mp4 68.7 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Nguyen Anh Quynh - Invisible Honeypot Monitoring.mp4 68.7 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Nish Balla - Finding Secrets in ISAPI.mp4 56.4 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Paul Boeh.mp4 47.0 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Paul Boehm - Taming Bugs.mp4 47.0 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Philippe Biondi & Arnaud Ebalard - Scapy and IPv6.mp4 78.9 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Philippe.mp4 78.9 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Raoul Chi.mp4 56.2 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Raoul Chiesa - Hacker's Profiling Project (HPP).mp4 56.2 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Roberto P.mp4 59.5 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Roberto Preatoni & Fabio Ghioni - The Biggest Brother.mp4 59.5 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Rohyt Bel.mp4 67.6 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Rohyt Belani - Smashing the stack for profit - period.mp4 67.6 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Saumil Sh.mp4 69.3 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Saumil Shah - Writing Metasploit Plugins.mp4 69.3 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ The Grugq - VoIPhreaking_ SIPhallis Unveiled.mp4 78.2 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ The Grugq.mp4 78.2 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Thorsten Holz - Playing with Botnets.mp4 59.7 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Thorsten.mp4 59.7 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Van Hause.mp4 75.7 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Van Hauser - Attacking the IPv6 Protocol Suite.mp4 75.7 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Wes Brown - MOSREF(2).mp4 78.4 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Wes Brown - MOSREF.mp4 78.4 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Wes Brown.mp4 78.4 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Window Sn.mp4 61.3 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Window Snyder - Firefox Security.mp4 61.3 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Yen Min C.mp4 77.1 MB
  • HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Yen Min Cheng - Triple Play_ Triple Threats_.mp4 77.1 MB
  • Hack in the Box thank you.txt 770 Bytes
  • HITB 2007 - Malaysia/D1T1 - Andrew Cushman - State of Security.mov 244.4 MB
  • HITB 2007 - Malaysia/D1T1 - Grugq - Meta Anti Forensics - The Hash Hacking Harness.mov 92.9 MB
  • HITB 2007 - Malaysia/D1T1 - Marc Weber Tobias and TOOOL USA - High Security Locks.mov 163.1 MB
  • HITB 2007 - Malaysia/D1T1 - Martin Johns - Hacking the Intranet with a Webpage.mov 92.5 MB
  • HITB 2007 - Malaysia/D1T1 - Michael Thumann and Dror John Roecher - Hacking Cisco NAC.mov 232.6 MB
  • HITB 2007 - Malaysia/D1T2 - Andrea Barisani and Daniele Bianco - Injecting RDS-TMC.mov 265.1 MB
  • HITB 2007 - Malaysia/D1T2 - Frank Yuan Fan - Advanced Web Application and Database Threat Analysis with MatriXay.mov 85.6 MB
  • HITB 2007 - Malaysia/D1T2 - Raffael Marty - Insider Threat Visualization.mov 100.9 MB
  • HITB 2007 - Malaysia/D1T2 - Raoul Chiesa and Mayhem - Hacking SCADA.mov 80.9 MB
  • HITB 2007 - Malaysia/D1T2 - Roberto Preatoni - WabiSabiLabi - The Exploit Marketplace.mov 203.7 MB
  • HITB 2007 - Malaysia/D1T2 - Stefano Zanero - Anomaly Based Intrusion Detection.mov 165.1 MB
  • HITB 2007 - Malaysia/D2T1 - Alexander Kornbrust - Hacking Hardend and Secured Oracle Servers.mov 152.4 MB
  • HITB 2007 - Malaysia/D2T1 - Billy Rios and Nathan McFeters - Slipping Past the Firewall.mov 165.1 MB
  • HITB 2007 - Malaysia/D2T1 - Felix FX Lindner - Attack Surface of Modern Applications.mov 110.9 MB
  • HITB 2007 - Malaysia/D2T1 - Shreeraj Shah - Hacking AJAX and Web Services.mov 123.0 MB
  • HITB 2007 - Malaysia/D2T1 - Starbug - Hacking Biometric Passports.mov 113.7 MB
  • HITB 2007 - Malaysia/D2T1 - Window Snyder - Tools and Strategies for Securing a Large Development Project.mp4 121.0 MB
  • HITB 2007 - Malaysia/D2T2 - Dino Covotsos - Hacking the Bluetooth Stack for Fun Fame and Profit.mov 430.1 kB
  • HITB 2007 - Malaysia/D2T2 - Domingo Montanaro and Rodrigo Branco - Computer Forensics Challenge and Anti-Forensics Techniques.mov 450.6 kB
  • HITB 2007 - Malaysia/D2T2 - Fetri Miftach and Jim Geovedi - Hacking Trust aka Enterprise Hacking.mov 466.9 kB
  • HITB 2007 - Malaysia/D2T2 - Jose Nazario - Googling for Malware and Bugs.mov 495.6 kB
  • HITB 2007 - Malaysia/D2T2 - Luiz Eduardo - Protocol Fuzzing.mov 221.4 MB
  • HITB 2007 - Malaysia/D2T2 - Sarb Sembhi - An End to End Analysis of Securing Networked CCTV Systems.mov 265.7 MB
  • HITB 2007 - Malaysia/KEYNOTE 1 - Lance Spitzner - Honeypots - Past Present and Future.mp4 175.4 MB
  • HITB 2007 - Malaysia/KEYNOTE 2 - Mikko Hypponen - Online Crime and Crime Online.mp4 178.9 MB
  • HITB 2007 - Malaysia/KEYNOTE 3 - Mark Phiber Optik Abene.mov 2.3 MB
  • HITB 2007 - Malaysia/KEYNOTE 4 - Emmanuel Goldstein.mov 2.3 MB
  • HITB 2008 - Dubai/D1T1 - Ero Carrera - Malware Behavior Tools Scripting and Adavanced Analysis.zip 2.3 MB
  • HITB 2008 - Dubai/D1T1 - Jim Geovedi - Hijacking VSAT Connections.zip 1.9 MB
  • HITB 2008 - Dubai/D1T1 - Michael Thumann - Hacking Second Life.zip 106.7 MB
  • HITB 2008 - Dubai/D1T1 - Shreeraj Shah - Securing Next Generation Applications - Scan Detect and Mitigate.zip 408.8 kB
  • HITB 2008 - Dubai/D1T2 - Alessio Penasilico - VoIP INsecurities - Italians Do It Better.zip 12.9 MB
  • HITB 2008 - Dubai/D1T2 - Jamie Butler - Computer Forensics and Incident Response.zip 172.8 kB
  • HITB 2008 - Dubai/D1T2 - Meling Mudin and Lee Chin Sheng - Defensive Network Security.pdf 1.0 MB
  • HITB 2008 - Dubai/D1T2 - Skyper - Cracking the GSM A5-1 Encryption in Seconds.zip 3.2 MB
  • HITB 2008 - Dubai/D2T1 - Adrian Pastor - Cracking Into Embeded Devices and Beyond.zip 40.1 MB
  • HITB 2008 - Dubai/D2T1 - Cesar Cerrudo - Token Kidnapping.zip 174.8 kB
  • HITB 2008 - Dubai/D2T1 - Daniel Ingevaldson - Virtualization != Security.zip 10.6 MB
  • HITB 2008 - Dubai/D2T1 - Dino Covotsos - Hacking the Bluetooth Stack for Fun Fame and Mayhem.zip 60.6 MB
  • HITB 2008 - Dubai/D2T1 - Petko Petkov - For My Next Trick - Client Side Hacking.zip 7.5 MB
  • HITB 2008 - Dubai/D2T1 Hacking the bluetooth stack.mpg 15.3 MB
  • HITB 2008 - Dubai/D2T2 - Alexander Kornbrust - Practical Oracle Forensics.zip 1.3 MB
  • HITB 2008 - Dubai/D2T2 - Benjamin Hagen and Walter Goulet - Real World Attacks Against 3G Networks Using Subscriber Devices.zip 385.0 kB
  • HITB 2008 - Dubai/D2T2 - Domingo Montanaro - In-depth Anti-Forensics - Challenges of Steganography and Discovering Hidden Data.zip 1.5 MB
  • HITB 2008 - Dubai/D2T2 - Raoul Chiesa and Alessio Pennasillico - Penetration Testing SCADA.zip 7.7 MB
  • HITB 2008 - Dubai/D2T2 - Rodrigo Rubira Branco - Hacking The Cell Architecture.zip 1.5 MB
  • HITB 2008 - Dubai/DAY 2 - KEYNOTE - Jeremiah Grossman.zip 5.6 MB
  • HITB 2008 - Malaysia/CTF Prize Giving & Charity Auction.mp4 339.5 MB
  • HITB 2008 - Malaysia/Day1-Keynote-1.JeremiahGrossman-The Art Of Click Jacking.mp4 210.3 MB
  • HITB 2008 - Malaysia/Day1-Keynote-2.MarcusRanum-Cyberwar Is Bullshit.mp4 211.1 MB
  • HITB 2008 - Malaysia/Day1-Track1-DinoDaiZovi-Mac OS X Exploitation.mp4 218.1 MB
  • HITB 2008 - Malaysia/Day1-Track1-Ero Carrera - Analysis and Visualization of Common Packers.mp4 211.6 MB
  • HITB 2008 - Malaysia/Day1-Track1-HernanOchoa-Pass The Hass Toolkit for Windows.mp4 198.1 MB
  • HITB 2008 - Malaysia/Day1-Track1-Jim Geovedi & Raditya Iryandi - Hacking a Bird in the Sky 2.0.mp4 139.2 MB
  • HITB 2008 - Malaysia/Day1-Track1-Julian Ho - MoocherHunting - Real-Time Geo-Location Unauthorized WiFi Users.mp4 190.6 MB
  • HITB 2008 - Malaysia/Day1-Track1-Peter Silberman - Full Process Reconsitution from Memory.mp4 197.1 MB
  • HITB 2008 - Malaysia/Day1-Track1-ThomasVarghese-Delivering Identity Management 2.0 by Leveraging OPSS.mp4 173.9 MB
  • HITB 2008 - Malaysia/Day1-Track2-Alexander Tereskin - Bluepilling the Xen Hypervisor.mp4 178.9 MB
  • HITB 2008 - Malaysia/Day1-Track2-Eric Lawrence - Internet Explorer 8 - Trustworthy Engineering and Browsing.mp4 230.4 MB
  • HITB 2008 - Malaysia/Day1-Track2-Jonathan Squire - A Fox in the Hen House - UPnP IGD.mp4 208.4 MB
  • HITB 2008 - Malaysia/Day1-Track2-Paul Craig - Hacking Internet Kiosks.mp4 230.1 MB
  • HITB 2008 - Malaysia/Day1-Track2-Roberto Preatoni - Time for a free hardware foundation.mp4 194.5 MB
  • HITB 2008 - Malaysia/Day1-Track2-Saumil Shah - Browser Exploits - A New Model For Browser Security.mp4 207.9 MB
  • HITB 2008 - Malaysia/Day1-Track2-The Grugq - How The Leopard Hides His Spots - OS X Anti-Forensics Techniques.mp4 201.0 MB
  • HITB 2008 - Malaysia/Day2-Keynote.The Pirate Bay - Dissolving an Industry as a Hobby.mp4 308.1 MB
  • HITB 2008 - Malaysia/Day2-Track1-Charl Van Der Walt - Pushing the Camel Through the Eye of a Needle.mp4 240.6 MB
  • HITB 2008 - Malaysia/Day2-Track1-Charlie Miller - iPwning the iPhone.mp4 217.9 MB
  • HITB 2008 - Malaysia/Day2-Track1-Ilfak Guilfanov - Decompilers and Beyond.mp4 216.6 MB
  • HITB 2008 - Malaysia/Day2-Track1-Kris Kaspersky - Remote Code Execution Through Intel CPU Bugs.mp4 123.0 MB
  • HITB 2008 - Malaysia/Day2-Track1-Petko D Petkov - Client-Side Security.mp4 146.7 MB
  • HITB 2008 - Malaysia/Day2-Track2-Adrian Pagvac Pastor - Cracking into Embedded Devices and Beyond.mp4 206.8 MB
  • HITB 2008 - Malaysia/Day2-Track2-AR - Next Generation Reverse Shell.mp4 236.5 MB
  • HITB 2008 - Malaysia/Day2-Track2-Matthew Geiger - How to Build Your Own Password Cracker with a VM.mp4 195.2 MB
  • HITB 2008 - Malaysia/Day2-Track2-Shreeraj Shah - Top 10 Web 2.0 Attacks.mp4 236.9 MB
  • HITB 2009 - Malaysia/Alexander Gazet & Yoann Guilot - Defeating Software Protection with Metasm.mp4 118.3 MB
  • HITB 2009 - Malaysia/Announcement of CTF Winners and Final HITB Charity Auction.mp4 189.1 MB
  • HITB 2009 - Malaysia/Bruno Goncalves - Hacking From The Restroom.mp4 111.6 MB
  • HITB 2009 - Malaysia/ctf-clip1.mp4 6.6 MB
  • HITB 2009 - Malaysia/CTF.mp4 3.0 MB
  • HITB 2009 - Malaysia/Dimitrious Petroulos - Having Fun With ATMs and HSMs.mp4 135.7 MB
  • HITB 2009 - Malaysia/Ed Skoudis - The Bad Guys Are Winning. So Now What.mp4 315.9 MB
  • HITB 2009 - Malaysia/Frederic Raynal, Guillaume Deluge, Damien Aumaitre - PDF Origami Strikes Back.mp4 117.1 MB
  • HITB 2009 - Malaysia/Fyodor Yarochkin and The Grugq - From Russia With Love.exe.mp4 168.3 MB
  • HITB 2009 - Malaysia/Harron Meer - Clobbering The Cloud.mp4 111.4 MB
  • HITB 2009 - Malaysia/Job De Haas - Side Channel Analysis on Embedded Systems.mp4 145.1 MB
  • HITB 2009 - Malaysia/Joe Grand - Hardware Is The New Software.mp4 124.5 MB
  • HITB 2009 - Malaysia/Julian Assage - Publishing the Unpublished.mp4 158.0 MB
  • HITB 2009 - Malaysia/Julien Tinnes, Chris Evans - Security In-Depth for Linux Software.mp4 122.6 MB
  • HITB 2009 - Malaysia/Kuza55 - Implementing a Blind TCPIP Hijacking Tool.mp4 97.4 MB
  • HITB 2009 - Malaysia/Lucas Adamski - Freeing Sisyphus, Declaratively Address Web Security Issue.mp4 92.5 MB
  • HITB 2009 - Malaysia/MARES - APRS,HAM Radio.mp4 142.7 MB
  • HITB 2009 - Malaysia/Mark Dowd - Attacking Interoperability.mp4 115.9 MB
  • HITB 2009 - Malaysia/Meling Mudin & CS Lee - Network Forensics.mp4 179.6 MB
  • HITB 2009 - Malaysia/Nguyen Anh Quyuh - eKimono, A Malware Scanner for Virtual Machines.mp4 137.9 MB
  • HITB 2009 - Malaysia/Nishad Herath - How Low Will Malware Go.mp4 117.1 MB
  • HITB 2009 - Malaysia/Paul Theriault - Browser Ghosting Attacks.mp4 73.5 MB
  • HITB 2009 - Malaysia/Rop Gonggip - Modern Day Robin Hoods.mp4 166.6 MB
  • HITB 2009 - Malaysia/Saumil Shah - How To Own The World, One Desktop At A Time.mp4 135.2 MB
  • HITB 2009 - Malaysia/Sheran Gunasekera - Bugs and Kisses, Spying on Blackberry Users for Fun.mp4 134.9 MB
  • HITB 2009 - Malaysia/Steve Anson - Detecting Computer Intrusions.mp4 94.9 MB
  • HITB 2009 - Malaysia/The Secret History Of Hacking.DivxMp3.mp4 97.3 MB
  • HITB 2009 - Malaysia/Travis Ormandy - Making Software Dumber.mp4 69.1 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 1.mp4 11.7 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 1.srt 9.0 kB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 2.mp4 13.7 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 2.srt 8.0 kB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 3.mp4 18.5 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 3.srt 11.1 kB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 4.mp4 13.7 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 4.srt 7.3 kB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 5.mp4 11.1 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 5.srt 7.2 kB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 2 - Taking Back the DNS Part 1.mp4 11.7 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 2 - Taking Back the DNS Part 2.mp4 11.8 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 2 - Taking Back the DNS Part 3.mp4 18.4 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 2 - Taking Back the DNS Part 4.mp4 21.9 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote 2 - Taking Back the DNS Part 5.mp4 17.2 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 1.mp4 13.7 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 1.srt 8.6 kB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 10.mp4 17.3 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 10.srt 10.2 kB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 2.mp4 13.7 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 3.mp4 16.8 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 3.srt 11.0 kB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 4.mp4 13.7 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 4.srt 8.9 kB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 5.mp4 11.8 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 5.srt 9.5 kB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 6.mp4 16.8 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 7.mp4 13.3 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 8.mp4 13.3 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 8.srt 8.5 kB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 9.mp4 16.4 MB
  • HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 9.srt 11.0 kB
  • HITB 2011 - Amsterdam/Hackers Op De Gracht.mp4 32.8 MB
  • HITB 2011 - Malaysia/D1 LABS - VoIP Attacking CUCM.pdf 2.8 MB
  • HITB 2011 - Malaysia/D1 SIGINT - Adnan Mohd Shukor - Fun With Javascript DeObfuscation.pdf 4.2 MB
  • HITB 2011 - Malaysia/D1 SIGINT - Elger Stitch Jonker - Building the Hackerspace.pdf 8.8 MB
  • HITB 2011 - Malaysia/D1 SIGINT - Jurre van Bergen and Youri van der Zwart - Abusing RFID.pdf 790.0 kB
  • HITB 2011 - Malaysia/D1 SIGINT - Muhammad Najmi Ahmad Zabidi - Compiling Features for Malcious Binaries.pdf 420.2 kB
  • HITB 2011 - Malaysia/D1 SIGINT - Raoul Chiesa - Cyber Weapons in 2011.pdf 7.4 MB
  • HITB 2011 - Malaysia/D1T1 - Alex Kirk - Mobile Malware Analysis.pdf 1.9 MB
  • HITB 2011 - Malaysia/D1T1 - Andrea Barisani and Daniele Bianco - EMV Protocol and POS Physical Analysis.pdf 2.1 MB
  • HITB 2011 - Malaysia/D1T1 - Elena K and Joffrey C - Webshells - A Framework for Pentesting.pdf 5.4 MB
  • HITB 2011 - Malaysia/D1T1 - Jonathan Brossard - Post Memory Corruption Analysis.pdf 284.6 kB
  • HITB 2011 - Malaysia/D1T1 - Mahmud Ab Rahman - Reverse Engineering Android Malware.pdf 9.7 MB
  • HITB 2011 - Malaysia/D1T1 - Marco Balduzzi - Attacking the Privacy of Social Network Users.pdf 6.7 MB
  • HITB 2011 - Malaysia/D1T1 - Mariano Nunez - Attacks Against SAP Web Applications.pdf 1.4 MB
  • HITB 2011 - Malaysia/D1T1 - Riley Hassell - Exploiting Androids for Fun and Profit.pdf 9.4 MB
  • HITB 2011 - Malaysia/D1T1 - Stefan Esser - Antid0te 2.0 - ASLR in iOS.pdf 5.0 MB
  • HITB 2011 - Malaysia/D1T2 - Alexander Polyakov and Dimitry Chastuhin - SAPocalypse Now.pdf 15.9 MB
  • HITB 2011 - Malaysia/D1T2 - Asia Slowinka - Excavating Data Structures from Stripped Binaries.pdf 902.7 kB
  • HITB 2011 - Malaysia/D1T2 - biatch0 and RuFI0 - Pwning a 4G Device for the LuLz.pdf 3.7 MB
  • HITB 2011 - Malaysia/D1T2 - Claudio Criscione - MetaXSSploit - Bringing XSS to Pentesting.pdf 3.2 MB
  • HITB 2011 - Malaysia/D1T2 - Don Bailey - GoodFUN - The GoodFET.pdf 991.1 kB
  • HITB 2011 - Malaysia/D1T2 - Guillaume Prigent - Really Open Source Information Gathering.pdf 5.6 MB
  • HITB 2011 - Malaysia/D1T2 - Jim Geovedi - Satellite Telephony Security.pdf 5.7 MB
  • HITB 2011 - Malaysia/D1T2 - Laurent Oudot - Extracting Senstive Data from Your iPhone.pdf 14.6 MB
  • HITB 2011 - Malaysia/D1T2 - Laurent Weber - All your Base Stations Are Belong To Us.pdf 320.0 kB
  • HITB 2011 - Malaysia/D1T2 - The Grugq - Smashing the Slack for Fun and Profit.pdf 14.7 MB
  • HITB 2011 - Malaysia/D1T2 - Thomas Caplin - Silverlight - A New Way to Surf .Net Holes.pdf 1.5 MB
  • HITB 2011 - Malaysia/D1T3 - Barry van Kampen - DIY Video Surveillance.pdf 915.7 kB
  • HITB 2011 - Malaysia/D1T3 - Didier Stevens - Malicious PDF Analysis Lab/HITB2011AMS - PDF Chapter.pdf 272.0 kB
  • HITB 2011 - Malaysia/D1T3 - Didier Stevens - Malicious PDF Analysis Lab/HITB2011AMS - Slides.pdf 42.4 kB
  • HITB 2011 - Malaysia/D1T3 - Didier Stevens - Malicious PDF Analysis Lab/HITB2011AMS - Solutions.txt 2.7 kB
  • HITB 2011 - Malaysia/D1T3 - Itzhak Zuk Avraham - Popping Shell On Android Devices.pdf 1.3 MB
  • HITB 2011 - Malaysia/D1T3 - Jimmy Shah - Mobile App Moolah.pdf 1.7 MB
  • HITB 2011 - Malaysia/D1T3 - Mitja Kolsek - Remote Binary Planting.pdf 4.4 MB
  • HITB 2011 - Malaysia/D2 LABS - Daniel Mende and Jim Geovedi - Practical 3G-4G Attacks.pdf 2.3 MB
  • HITB 2011 - Malaysia/D2 SIGINT - Jim Manico - Ghost of XSS Past Present and Future.pdf 2.2 MB
  • HITB 2011 - Malaysia/D2 SIGINT - Keith Lee - iPhone Espionage.pdf 5.1 MB
  • HITB 2011 - Malaysia/D2 SIGINT - Martin Knobloch - Secure Your Software Using OWASP.pdf 1.6 MB
  • HITB 2011 - Malaysia/D2 SIGINT - Nur Muhammed Kamil - MyKotakPasir.pdf 1.2 MB
  • HITB 2011 - Malaysia/D2T1 - Andreas Weigenstein - SQL Injection with ABAP.pdf 1.3 MB
  • HITB 2011 - Malaysia/D2T1 - Andrew Gavin - Stealing Sensitive Data from Thousands of Systems.pdf 65.9 kB
  • HITB 2011 - Malaysia/D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities/D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities.zip 50.6 MB
  • HITB 2011 - Malaysia/D2T1 - Daniele Bianco and Adam Laurie - Credit Card Skimming and PIN Harvesting in an EMV World.pdf 3.6 MB
  • HITB 2011 - Malaysia/D2T1 - Hendrik Scholz - Air Travel Hacking.pdf 5.7 MB
  • HITB 2011 - Malaysia/D2T1 - Itzik Kotler - Let Me Stuxnet You.pdf 542.6 kB
  • HITB 2011 - Malaysia/D2T1 - Ivan Ristic - A Study of What Really Breaks SSL.pdf 3.2 MB
  • HITB 2011 - Malaysia/D2T1 - Marc Blanchou and Mathew Solnik - Blackbox Android.pdf 3.7 MB
  • HITB 2011 - Malaysia/D2T1 - Ravi B Kevin R and Nico G - Femtocells.pdf 6.2 MB
  • HITB 2011 - Malaysia/D2T1 - Stefan Esser - iPhone Exploitation - One ROPe to Bind Them All.pdf 8.6 MB
  • HITB 2011 - Malaysia/D2T2 - D. Mende & Enno Rey - Attacking 3G and 4G Networks.pdf 2.4 MB
  • HITB 2011 - Malaysia/D2T2 - Jim Geovedi and Raoul Chiesa - Hacking a Bird in the Sky.pdf 18.1 MB
  • HITB 2011 - Malaysia/D2T2 - KaiJern Lau - Malware Sandboxing the Xandora Way.pdf 16.2 MB
  • HITB 2011 - Malaysia/D2T2 - Paul Sebastian Ziegler - Stenographic AVI FIlesystems.pdf 3.1 MB
  • HITB 2011 - Malaysia/D2T2 - Philippe Langlois - Attacking the GPRS Roaming Exchange.pdf 13.5 MB
  • HITB 2011 - Malaysia/D2T2 - Rosario Valotta - Cookie Jacking.pdf 2.6 MB
  • HITB 2011 - Malaysia/D2T2 - Shreeraj Shah - Next Generation Web Attacks.pdf 752.9 kB
  • HITB 2011 - Malaysia/D2T2 - Travis Goodspeed - Remotely Exploiting Layer One.pdf 318.5 kB
  • HITB 2011 - Malaysia/D2T3 - Aditya K Sood - Spying on SpyEye.pdf 2.8 MB
  • HITB 2011 - Malaysia/D2T3 - Bert Hubert - DNSSEC - The Good The Bad and The Very Bad.pdf 407.0 kB
  • HITB 2011 - Malaysia/D2T3 - Guillaume Delugre - Reverse Engineering Broadcom NetExtreme Firmware.pdf 1.3 MB
  • HITB 2011 - Malaysia/D2T3 - Maarten Oosterink - Attacking Critical Infrastructure.pdf 2.5 MB
  • HITB 2011 - Malaysia/D2T3 - Travis Goodspeed - Building a Promiscious nRF24L01 Packet Sniffer.pdf 32.2 MB
  • HITB 2011 - Malaysia/HackWEEKDAY - Arzumy.pdf 250.1 kB
  • HITB 2011 - Malaysia/KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.pdf 1.6 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS - KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line (2).srt 89.7 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS - KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line.mp4 164.7 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS - KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line.srt 89.7 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS CLOSING KEYNOTE - Ms jaya Baloo - Identity, Privacy and Security.mp4 178.1 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Arnauld Mascret - Whistling Over the Wire.mp4 159.3 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis (2).srt 66.3 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis.mp4 152.7 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis.srt 66.3 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Ivo Pooters - Turning Android Inside Out (2).srt 72.1 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Ivo Pooters - Turning Android Inside Out.mp4 150.9 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Ivo Pooters - Turning Android Inside Out.srt 72.1 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Juan Pablo Echtegoyen - Attacking the SAP Solution Manager (2).srt 64.2 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Juan Pablo Echtegoyen - Attacking the SAP Solution Manager.mp4 180.5 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Juan Pablo Echtegoyen - Attacking the SAP Solution Manager.srt 64.2 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012 (2).srt 76.4 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012.mp4 166.1 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012.srt 76.4 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV (2).srt 95.9 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV.mp4 244.2 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV.srt 95.9 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets (2).srt 76.8 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets.mp4 168.4 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets.srt 76.8 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE (2).srt 68.7 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE.mp4 214.8 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE.srt 68.7 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks (2).srt 60.5 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks.mp4 123.9 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks.srt 60.5 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT (2).srt 44.2 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT.mp4 124.4 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT.srt 44.2 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities (2).srt 107.2 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities.mp4 192.1 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities.srt 107.2 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond (2).srt 82.9 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond.mp4 124.7 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond.srt 82.9 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Dr Marco Balduzzi - SatanCloud (2).srt 68.0 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Dr Marco Balduzzi - SatanCloud.mp4 139.4 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Dr Marco Balduzzi - SatanCloud.srt 68.0 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Georgia Weidman - Bypassing the Android Permission Model (2).srt 84.4 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Georgia Weidman - Bypassing the Android Permission Model.mp4 199.6 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Georgia Weidman - Bypassing the Android Permission Model.srt 84.4 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services (2).srt 75.6 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services.mp4 178.6 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services.srt 75.6 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Dream Team - Part 1 - Corona for iOS 5.0.1 (2).srt 59.7 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Dream Team - Part 1 - Corona for iOS 5.0.1.mp4 201.7 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Dream Team - Part 1 - Corona for iOS 5.0.1.srt 59.7 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing) (2).srt 68.7 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing).mp4 190.1 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing).srt 68.7 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Nicolas Gregoire - Attacking XML Preprocessing (2).srt 62.3 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Nicolas Gregoire - Attacking XML Preprocessing.mp4 162.2 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Nicolas Gregoire - Attacking XML Preprocessing.srt 62.3 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Rahul Sasi - CXML VXML IVR Pentesting for Auditors.mp4 130.5 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Steven Seeley - Ghost in the Windows 7 Allocator (2).srt 81.6 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Steven Seeley - Ghost in the Windows 7 Allocator.mp4 158.9 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Steven Seeley - Ghost in the Windows 7 Allocator.srt 81.6 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS DAY 1 SPECIAL CLOSING - Rop Gonggrijp (2).srt 46.2 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS DAY 1 SPECIAL CLOSING - Rop Gonggrijp.mp4 114.4 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS DAY 1 SPECIAL CLOSING - Rop Gonggrijp.srt 46.2 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS KEYNOTE 2 - Bruce Schneier - Trust Security and Society (2).srt 72.4 kB
  • HITB 2012 - Amsterdam/#HITB2012AMS KEYNOTE 2 - Bruce Schneier - Trust Security and Society.mp4 159.8 MB
  • HITB 2012 - Amsterdam/#HITB2012AMS KEYNOTE 2 - Bruce Schneier - Trust Security and Society.srt 72.4 kB
  • HITB 2012 - Amsterdam/Hackers Op De Gracht.mp4 96.8 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T1 - A. Barisani & D. Bianco - Practical Exploitation of Embedded Systems.mp4 205.9 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T1 - A. Barisani & D. Bianco - Practical Exploitation of Embedded Systems.srt 84.4 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T1 - Chris Wysopal - Data Mining a Mountain of Vulnerabilities.mp4 226.1 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T1 - Chris Wysopal - Data Mining a Mountain of Vulnerabilities.srt 89.2 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T1 - Lucas Adamski - Mozilla Apps, Firefox OS and You.mp4 216.5 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T1 - Lucas Adamski - Mozilla Apps, Firefox OS and You.srt 72.9 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T1 - P. Langlois & E. Gadaix - Why Telcos Keep Getting Hacked.mp4 264.3 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T1 - P. Langlois & E. Gadaix - Why Telcos Keep Getting Hacked.srt 94.8 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T1 - Petko D. Petkov - A Short History of the JavaScript Security Arsenal.mp4 253.4 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T1 - Petko D. Petkov - A Short History of the JavaScript Security Arsenal.srt 90.2 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Don Bailey - Hackers the Movie A Retrospective.mp4 189.2 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Don Bailey - Hackers the Movie A Retrospective.srt 79.5 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Haroon Meer - You and Your Research.mp4 158.1 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Haroon Meer - You and Your Research.srt 72.7 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Marc Van Hauser Heuse - IPv6 Insecurity Revolutions.mp4 271.7 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Marc Van Hauser Heuse - IPv6 Insecurity Revolutions.srt 92.0 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Mark Dowd & Tarjei Mandt - iOS 6 Security.mp4 194.4 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Mark Dowd & Tarjei Mandt - iOS 6 Security.srt 81.3 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Meder Kydyraliev - Defibrilating Web Security.mp4 209.2 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Meder Kydyraliev - Defibrilating Web Security.srt 80.0 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Wes Brown - Supercomputing, Malware and Correlation.mp4 165.0 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Wes Brown - Supercomputing, Malware and Correlation.srt 49.3 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T3 - John Captain Crunch Draper - A Historical Look at the Phreaking Scene.mp4 180.4 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T3 - John Captain Crunch Draper - A Historical Look at the Phreaking Scene.srt 75.5 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T3 - Paul Sebastian Ziegler - Hacking in The Far East.mp4 201.0 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T3 - Paul Sebastian Ziegler - Hacking in The Far East.srt 97.0 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T3 - The Grugq - OPSEC Because Jail is for wuftpd.mp4 216.6 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D1T3 - The Grugq - OPSEC Because Jail is for wuftpd.srt 91.7 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2 PANEL DISCUSSION iOS OS X Security.mp4 182.7 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2 PANEL DISCUSSION iOS OS X Security.srt 75.8 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Chris Evans - Element 1337 in the Periodic Table Pwnium.mp4 179.0 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Chris Evans - Element 1337 in the Periodic Table Pwnium.srt 75.4 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Katie Moussouris - How to Get Along With Vendors Without Really Trying.mp4 192.4 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Katie Moussouris - How to Get Along With Vendors Without Really Trying.srt 92.1 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Ollie Whitehouse - Finding the Weak Link in Binaries.mp4 165.9 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Ollie Whitehouse - Finding the Weak Link in Binaries.srt 59.5 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Paul Vixie - Silo Busting in Information Security The ISC SIE Approach.mp4 256.5 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Paul Vixie - Silo Busting in Information Security The ISC SIE Approach.srt 85.3 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Rodrigo Rubira Branco - Study of Malware Obfuscation Techniques.mp4 238.1 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Rodrigo Rubira Branco - Study of Malware Obfuscation Techniques.srt 89.4 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Shreeraj Shah - XSS & CSRF Strike Back -- Powered by HTML5.mp4 216.8 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Shreeraj Shah - XSS & CSRF Strike Back -- Powered by HTML5.srt 80.6 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T2 - Fyodor Yarochkin - Messing Up the Kids Playground.mp4 267.2 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T2 - Fyodor Yarochkin - Messing Up the Kids Playground.srt 93.5 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T2 - Jeremiah Grossman - Why Web Security is Fundamentally Broken.mp4 192.3 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T2 - Jeremiah Grossman - Why Web Security is Fundamentally Broken.srt 73.4 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T2 - John Viega - Crypto for the Public Cloud.mp4 180.5 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T2 - John Viega - Crypto for the Public Cloud.srt 71.2 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T2 - Saumil Shah - Innovative Approaches to Exploit Delivery.mp4 219.9 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T2 - Saumil Shah - Innovative Approaches to Exploit Delivery.srt 66.6 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T3 - OPEN BOTTLE - Security Industry Panel Discussion.mp4 439.2 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Emmanuel Gadaix - Something MEGA.mp4 143.5 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Emmanuel Gadaix - Something MEGA.srt 56.1 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Felix FX Lindner - Hacking Huawei VRP.mp4 164.7 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Felix FX Lindner - Hacking Huawei VRP.srt 51.8 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Mikko Hypponen - Behind Enemy Lines.mp4 244.4 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Mikko Hypponen - Behind Enemy Lines.srt 80.7 kB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Stefano Zanero - Scalable Malware Analysis.mp4 282.4 MB
  • HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Stefano Zanero - Scalable Malware Analysis.srt 75.1 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS CLOSING KEYNOTE Winn Schwartau - The History of the Future of InfoSec.mp4 230.5 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS CLOSING KEYNOTE Winn Schwartau - The History of the Future of InfoSec.srt 90.8 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS Coverage on RSI Telegiornale (Italian).mp4 6.1 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Hugo Teso - Aircraft Hacking Practical Aero Series.mp4 189.5 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Hugo Teso - Aircraft Hacking Practical Aero Series.srt 97.5 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T1 P Uhley and K Raman - Security Response in the Age of Mass Customized Attacks.mp4 220.3 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T1 P Uhley and K Raman - Security Response in the Age of Mass Customized Attacks.srt 108.8 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Petko D Petkov - Defeating the Intercepting Web Proxy.mp4 231.8 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Petko D Petkov - Defeating the Intercepting Web Proxy.srt 100.7 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Sergey Bratus and Julian Bangert - Page Fault Liberation Army.mp4 262.4 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Sergey Bratus and Julian Bangert - Page Fault Liberation Army.srt 90.4 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.mp4 238.6 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.srt 85.8 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T1 V. Vorontsov and A. Golovko - SSRF PWNs - New Techniques and Stories.mp4 168.8 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T1 V. Vorontsov and A. Golovko - SSRF PWNs - New Techniques and Stories.srt 59.5 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Daniel Mende - Paparazzi over IP.mp4 166.2 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Daniel Mende - Paparazzi over IP.srt 70.1 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Nicolas Seriot - Abusing Twitter s API and OAuth Implementation.mp4 150.4 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Nicolas Seriot - Abusing Twitter s API and OAuth Implementation.srt 52.4 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in MS Windows Kernel.mp4 175.7 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in MS Windows Kernel.srt 49.2 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Philippe Langlois - LTE Pwnage - Hacking Core Network Elements.mp4 229.3 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Philippe Langlois - LTE Pwnage - Hacking Core Network Elements.srt 75.5 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Tal Zeltzer - Analysis to Remote Root 0day in a SSL-VPN Appliance.mp4 184.0 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Tal Zeltzer - Analysis to Remote Root 0day in a SSL-VPN Appliance.srt 56.0 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.mp4 168.5 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.srt 59.4 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.mp4 120.3 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.srt 40.4 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Evad3rs - Swiping Through Modern Security Features.mp4 198.1 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Evad3rs - Swiping Through Modern Security Features.srt 87.7 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Peter Geissler and Steven Ketelaar - How I Met Your Modem.mp4 173.4 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Peter Geissler and Steven Ketelaar - How I Met Your Modem.srt 71.3 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T1 S. Shekyan and A. Harutyunyan - Turning Your Surveillance Camera Against You.mp4 162.8 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T1 S. Shekyan and A. Harutyunyan - Turning Your Surveillance Camera Against You.srt 56.3 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Sebastien Kaczmarek - Dreamboot - A UEFI Bootkit.mp4 246.4 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Sebastien Kaczmarek - Dreamboot - A UEFI Bootkit.srt 64.8 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Chilik Tamir - iNalyzer No More Blackbox iOS Analysis.mp4 234.6 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Dan Tentler - System Shock - The Shodan Computer Search Engine.mp4 168.9 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Ofer Shezaf - The Infosec Risks of Charging Electric Cars.mp4 213.1 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Ofer Shezaf - The Infosec Risks of Charging Electric Cars.srt 77.8 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Petukhov, Noseevich and Gamayunov - Breaking Certified Crypto in Banking Apps.mp4 178.7 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Petukhov, Noseevich and Gamayunov - Breaking Certified Crypto in Banking Apps.srt 52.6 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.mp4 128.0 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.srt 56.4 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS Evad3rs Press Briefing - 11th April 2013.mp4 115.5 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS Evad3rs Press Briefing - 11th April 2013.srt 18.8 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS KEYNOTE 1 E. Schwartz - Embracing the Uncertainty of Attacks with Big Data Analytics.mp4 234.2 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS KEYNOTE 1 E. Schwartz - Embracing the Uncertainty of Attacks with Big Data Analytics.srt 95.1 kB
  • HITB 2013 - Amsterdam/#HITB2013AMS KEYNOTE 2 Bob Lord - Rethinking the Front Lines.mp4 229.3 MB
  • HITB 2013 - Amsterdam/#HITB2013AMS KEYNOTE 2 Bob Lord - Rethinking the Front Lines.srt 98.8 kB
  • HITB 2014 - Amsterdam/presentations/D1-LAB-Sniffing-the-Airwaves-with-RTL-SDR.pdf 6.2 MB
  • HITB 2014 - Amsterdam/presentations/D1T1-AIS-Exposed-New-Vulnerabilities-and-Attacks.pdf 4.5 MB
  • HITB 2014 - Amsterdam/presentations/D1T1-Compromise-as-a-Service-Our-PleAZURE.pdf 8.2 MB
  • HITB 2014 - Amsterdam/presentations/D1T1-Escaping-IE11-Enhanced-Protected-Mode.pdf 2.3 MB
  • HITB 2014 - Amsterdam/presentations/D1T1-Hacking-Your-Cable-TV-Network-Die-Hard-Style.pdf 39.2 MB
  • HITB 2014 - Amsterdam/presentations/D1T1-The-NSA-Playset.pdf 10.4 MB
  • HITB 2014 - Amsterdam/presentations/D1T1-Vulnerabilities-Exposed-at-the-Protocol-Level-in-TN3270-based-Applications.pdf 17.3 MB
  • HITB 2014 - Amsterdam/presentations/D1T2-Bypassing-Endpoint-Security-for-Fun-and-Profit.pdf 28.2 MB
  • HITB 2014 - Amsterdam/presentations/D1T2-More-Ways-to-Defeat-Secure-Boot.pdf 7.3 MB
  • HITB 2014 - Amsterdam/presentations/D1T2-REboot-Bootkits-Revisited.pdf 924.3 kB
  • HITB 2014 - Amsterdam/presentations/D1T2-State-of-the-Art-Exploring-the-New-Android-KitKat-Runtime.pdf 641.8 kB
  • HITB 2014 - Amsterdam/presentations/D1T3-Exploiting-NoSQL-Like-Never-Before.pdf 2.5 MB
  • HITB 2014 - Amsterdam/presentations/D1T3-XSSing-Your-Way-to-Shell.pdf 5.0 MB
  • HITB 2014 - Amsterdam/presentations/D2-LAB-Attack-Surface-Intelligence-of-Source-Code.pdf 12.5 MB
  • HITB 2014 - Amsterdam/presentations/D2T1-Alices-Adventures-in-Smart-Building-Land.pdf 7.2 MB
  • HITB 2014 - Amsterdam/presentations/D2T1-Exploiting-Passbook-to-Fly-for-Free.pdf 19.8 MB
  • HITB 2014 - Amsterdam/presentations/D2T1-G-Jacking-AppEngine-based-Applications.pdf 784.7 kB
  • HITB 2014 - Amsterdam/presentations/D2T1-GRX-and-a-Spy-Agency.pdf 7.7 MB
  • HITB 2014 - Amsterdam/presentations/D2T1-Why-Port-Scans-are-for-Pussies.pdf 2.4 MB
  • HITB 2014 - Amsterdam/presentations/D2T2-Bitcoin-Forensics-Fact-or-Fiction.pdf 24.7 MB
  • HITB 2014 - Amsterdam/presentations/D2T2-Breaking-Cloud-Isolation.pdf 1.1 MB
  • HITB 2014 - Amsterdam/presentations/D2T2-Exploring-and-Exploiting-iOS-Web-Browsers.pdf 2.8 MB
  • HITB 2014 - Amsterdam/presentations/D2T2-Shellcodes-for-ARM-Your-Pills-Dont-Work-on-Me-x86.pdf 4.3 MB
  • HITB 2014 - Amsterdam/presentations/D2T2-The-InSecurity-of-Pull-Printing-Solutions.pdf 4.2 MB
  • HITB 2014 - Amsterdam/presentations/D2T3-Exploit-Development-for-New-Platforms-Based-on-64-bits.pdf 74.1 kB
  • HITB 2014 - Amsterdam/presentations/D2T3-Format-Reverser-of-Data-Objects.pdf 23.0 MB
  • HITB 2014 - Amsterdam/presentations/D2T3-Using-Javascript-Security-Features-to-Kill-Itself.pdf 2.0 MB
  • HITB 2014 - Malaysia/#HITB2014KUL CLOSING KEYNOTE - Richard Thieme.mp4 238.0 MB
  • HITB 2014 - Malaysia/#HITB2014KUL CLOSING KEYNOTE - Richard Thieme.srt 81.4 kB
  • HITB 2016 - Amsterdam/#HITB2016AMS - D2T1 - Forging a Wireless Time Signal to Attack NTP Servers - Y. Zheng & H. Shan.mp4 69.0 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS - The Women In Cyber Security Woman Of The Year 2016 Award Ceremony.mp4 75.1 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS CLOSING KEYNOTE - Hardware Side Channels in Virtualized Environments - Sophia D Antoine.mp4 73.1 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track - CLOSING COMMENTS - Martin Knobloch.mp4 4.1 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D1 - Applying Regulatory Data to IoT RF Reverse Engineering - Marc Newlin.mp4 93.8 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D1 - Don t Feed The Hippos - Martin Knobloch.mp4 40.2 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D1 - Exploiting GLIBC Hacking Everything - Gal De Leon and Nadav Markus.mp4 96.4 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D1 - Pentesting Chatops - Melanie Rieback.mp4 71.1 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D1 - Unformation In The Era Of Hyperconnectivity - Elisabeth De Leeuw.mp4 41.9 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D2 - Anatomy Of An APT Attack - Paul Mason.mp4 60.7 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D2 - Facebook Presents Capture The Flag - Paul Marinescu.mp4 41.2 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D2 - Hack In The Class - Barry Fish van Kampen.mp4 36.8 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D2 - Inspeckage Android Package Inspector - Antonio Martins.mp4 52.7 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D2 - Park This! Yet Another Parking Meter Talk - Paul Moreno.mp4 48.0 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D2 - Where Malware Meets Murphy - Mattijs Van Ommeren.mp4 47.8 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D1T1 - Escape From The Docker KVM QEMU Machine - Shengping Wang and Xu Liu.mp4 51.1 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D1T1 - Exploit Kits Hunting The Hunters - Nick Biasini.mp4 90.8 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D1T1 - TeLeScope Peering Into The Depths Of TLS Traffic In Real Time - Radu Caragea.mp4 85.9 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D1T1 - Using The Observer Effect And Cyber Feng Shui - Jacob Torrey.mp4 82.8 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D1T1 - Virtualization System Vulnerability Discovery Framework - Tang Qinghao.mp4 74.2 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D1T1 Forcing A Targeted LTE Cellphone Into An Eavesdropping Network - Lin Huang.mp4 65.3 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D1T2 - Adaptive Android Kernel Live Patching - Tim Xia and Yulong Zhang.mp4 72.5 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D1T2 - CSP Oddities - Michele Spagnuolo and Lukas Weichselbaum.mp4 107.1 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D1T2 - Hardsploit Project - Yann Allain and Julien Moinard.mp4 107.1 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D1T2 - IRON HID Create Your Own Bad USB Device - Seunghun Han.mp4 69.7 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D1T2 - Kernel Exploit Hunting And Mitigation - Broderick Aquilino and Wayne Low.mp4 83.3 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D1T2 - Sandjacking Profiting From iOS Malware - Chilik Tamir.mp4 109.6 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D2T1 - Attacking Next Generation Firewalls Breaking PAN OS - Felix Wilhelm.mp4 97.6 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D2T1 - Cache Side Channel Attacks CPU Design As A Security Problem - Anders Fogh.mp4 91.2 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D2T1 - CANsee An Automobile Intrusion Detection System - Jun Li.mp4 108.0 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D2T1 - In Plain Sight The Perfect Exfiltration Technique - Itzik Kotler and Amit Klein.mp4 103.9 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D2T2 - Advanced Exploitation Xen Hypervisor VM Escape - Shangcong Luan.mp4 72.7 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D2T2 - Breaking Naive ESSID WPA2 Key Generation Algorithms - Peter Blasty Geissler.mp4 92.9 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D2T2 - Go Speed Tracer Guided Fuzzing - Richard Johnson.mp4 111.9 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D2T2 - New Methods For Exploiting ORM Injections - Mikhail Egorov and Sergey Soldatov.mp4 98.5 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS D2T2 - Perf From Profiling To Kernel Exploiting - Wish Wu.mp4 61.9 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS KEYNOTE 1 - Beyond FBI vs Apple What s Next For The Crypto Wars - John Adams.mp4 41.7 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS KEYNOTE 2 - The Future Has Arrived And It s Effin Hilarious - Adam Laurie.mp4 101.8 MB
  • HITB 2016 - Amsterdam/#HITB2016AMS WELCOME ADDRESS - Patricia M Zorko.mp4 21.4 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG CLOSING KEYNOTE - Hacking in Song - Fabienne Serriere.mp4 77.6 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG CLOSING KEYNOTE - Hacking in Song - Fabienne Serriere.srt 27.3 kB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG CommSec Track D1 - Data Driven Software Security - Sweety Chauhan.mp4 125.9 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG CommSec Track D1- Halcyon - An IDE for Faster NSE Development - Sanoop Thomas.mp4 38.5 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG CommSec Track D2 - Copy-paste Vulnerabilities - Vanessa Henderson.mp4 30.5 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG CommSec Track D2 - Fake President Fraud Defrauded - Florian Lukavsky.mp4 39.8 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG CommSec Track D2 - IoT Honeypots - Tan Kean Siong.mp4 52.2 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG CommSec Track D2 - Local Privilege Escalation in 2016 - Paul Craig.mp4 39.7 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG CommSec Track D2 - Vulnerabilities and Ethics - Alfonso De Gregorio.mp4 49.7 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - A Next Generation Assembler Framework - Nguyen Anh Quynh.mp4 101.6 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - Attacking NVidia s Tegra Platform - Peter Pi.mp4 52.5 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - Attacking NVidia s Tegra Platform - Peter Pi.srt 24.1 kB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - Attacking Software Tokens - Bernhard Mueller.mp4 66.4 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - Stumping The Mobile Chipset - A. Donenfeld & Y. Mordekhay.mp4 73.1 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - Stumping The Mobile Chipset - A. Donenfeld & Y. Mordekhay.srt 51.4 kB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - The Apple Sandbox Deeper Into The Quagmire - Jonathan Levin.mp4 118.4 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - The Apple Sandbox Deeper Into The Quagmire - Jonathan Levin.srt 86.8 kB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - Trust No One - O. Kochetova & A. Osipov.mp4 65.7 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - (Ab)using Smart Cities - Matteo Beccaro & Matteo Collura.mp4 64.6 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - (Ab)using Smart Cities - Matteo Beccaro & Matteo Collura.srt 39.8 kB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - Breaking Exploits - Shlomi Oberman & Ron Shina.mp4 88.3 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - Breaking Exploits - Shlomi Oberman & Ron Shina.srt 58.3 kB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - Fuzzing The Windows Kernel - Koh Yong Chuan.mp4 47.3 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - iOS 10 Kernel Heap Revisited - Stefan Esser.mp4 105.5 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - iOS 10 Kernel Heap Revisited - Stefan Esser.srt 78.7 kB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - Look Mom! I Don t Use Shellcode - Moritz Jodeit.mp4 75.3 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - Look Mom! I Don t Use Shellcode - Moritz Jodeit.srt 61.0 kB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG KEYNOTE 1 - I Fight For The Users! The Prequel - Erin Jacobs.mp4 56.0 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG KEYNOTE 1 - I Fight For The Users! The Prequel - Erin Jacobs.srt 52.0 kB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG KEYNOTE 2 - Hacking The Pentagon - Katie Moussouris.mp4 81.8 MB
  • HITB 2016 - Singapore/#HITBGSEC 2016 SG KEYNOTE 2 - Hacking The Pentagon - Katie Moussouris.srt 65.8 kB
  • HITB 2016 - Singapore/#HITBGSEC Replicating a RSA SecurID Token Instance (RSA SecurID 2.0.4).mp4 598.5 kB
  • HITB 2016 - Singapore/#HITBGSEC Replicating a VASCO DIGIPASS Token Instance (DIGIPASS DEMO for Android 4.10.0).mp4 471.5 kB
  • HITB 2016 - Singapore/#HITBGSEC SG 2016 CommSec Track D1 - Reverse Engineering Swift Applications - Michael Gianarakis.mp4 43.6 MB
  • HITB 2016 - Singapore/#HITBGSEC SG 2016 CommSec Track D2 - Forensic Analysis of Android Banking Apps - Rajchada Chanajitt.mp4 38.1 MB
  • hitb logo.png 29.6 kB

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!